Jovvie In Person Payments for Event Tickets Security & Risk Analysis

wordpress.org/plugins/tec-jovvie-payments-gateway

Accept in person card payments for events using Event Tickets within the The Events Calendar ecosystem.

0 active installs v1.0.2 PHP 7.4.0+ WP 6.2+ Updated Feb 3, 2026
event-ticketsin-person-paymentsstripe-terminaltap-to-paythe-events-calendar
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Jovvie In Person Payments for Event Tickets Safe to Use in 2026?

Generally Safe

Score 100/100

Jovvie In Person Payments for Event Tickets has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1mo ago
Risk Assessment

The static analysis of "tec-jovvie-payments-gateway" v1.0.2 reveals a generally strong security posture with no identified critical or high-severity vulnerabilities in the provided data. The plugin demonstrates good practices by employing prepared statements for all SQL queries and implementing nonce and capability checks. The attack surface is minimal, with no exposed AJAX handlers, REST API routes, shortcodes, or cron events, and importantly, no unprotected entry points were detected. The absence of external HTTP requests further reduces the risk of remote code execution or data exfiltration through such channels.

However, a notable concern lies in the output escaping. While a significant portion of outputs are properly escaped, 265 total outputs with only 74% properly escaped indicates that a substantial number of outputs (approximately 69) are not adequately sanitized. This presents a potential Cross-Site Scripting (XSS) risk if untrusted user input is directly reflected in these unescaped outputs. The taint analysis showing zero flows is positive, but the existence of unescaped output means that potential XSS vulnerabilities might not have been flagged by this specific analysis if user input isn't directly linked to those outputs in the analyzed code paths.

The plugin's vulnerability history is entirely clean, with zero known CVEs recorded. This is a very positive indicator, suggesting a well-maintained and secure plugin thus far. However, this clean history, combined with the identified output escaping weakness, suggests that the plugin might not have been extensively targeted or rigorously tested for all types of vulnerabilities, particularly XSS. In conclusion, while the plugin exhibits strong foundational security practices and a clean history, the significant percentage of unescaped outputs is a tangible risk that warrants attention and remediation to prevent potential XSS attacks.

Key Concerns

  • Significant percentage of unescaped output
Vulnerabilities
None known

Jovvie In Person Payments for Event Tickets Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Jovvie In Person Payments for Event Tickets Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
69
196 escaped
Nonce Checks
2
Capability Checks
1
File Operations
2
External Requests
0
Bundled Libraries
0

Output Escaping

74% escaped265 total outputs
Attack Surface

Jovvie In Person Payments for Event Tickets Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
filtertec_tickets_commerce_gatewaysinc\App.php:60
actionwp_enqueue_scriptsinc\Checkout.php:46
actionadmin_enqueue_scriptsinc\Setting.php:56
filtertec_tickets_commerce_shortcode_success_page_template_varsinc\Success.php:15
actioninitinc\WebhookListener.php:32
actionadmin_initinc\WebhookListener.php:34
Maintenance & Trust

Jovvie In Person Payments for Event Tickets Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedFeb 3, 2026
PHP min version7.4.0
Downloads140

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Jovvie In Person Payments for Event Tickets Developer Profile

bizswoop

7 plugins · 3K total installs

96
trust score
Avg Security Score
94/100
Avg Patch Time
6 days
View full developer profile
Detection Fingerprints

How We Detect Jovvie In Person Payments for Event Tickets

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/tec-jovvie-payments-gateway/dist/checkout.css/wp-content/plugins/tec-jovvie-payments-gateway/dist/checkout.js
Script Paths
/wp-content/plugins/tec-jovvie-payments-gateway/dist/checkout.js
Version Parameters
tec-jovvie-payments-gateway/dist/checkout.css?ver=tec-jovvie-payments-gateway/dist/checkout.js?ver=

HTML / DOM Fingerprints

JS Globals
TEC_JOVVIE_PAYMENTS_GATEWAY_CHECKOUT_AJAX_URLTEC_JOVVIE_PAYMENTS_GATEWAY_CHECKOUT_AJAX_PROCESS_PAYMENTTEC_JOVVIE_PAYMENTS_GATEWAY_CHECKOUT_NONCE
REST Endpoints
/wp-json/tec_jovvie_payments_gateway/v1/webhook
FAQ

Frequently Asked Questions about Jovvie In Person Payments for Event Tickets